• Title/Summary/Keyword: 변조 방지

Search Result 239, Processing Time 0.022 seconds

A Study on the Information Security System of Fin-Tech Business (핀테크 기업의 정보보안체계 관한 연구)

  • Kang, Young-Mo;Lee, Young-Geun;Kwon, Hyun-Jung;Han, Keyung-Seok;Chung, Hyun-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.19-24
    • /
    • 2016
  • A Study on the Information Security System of Fin-Tech Business In traditional electronic commerce, there have not been severe issues of trading information through documents in paper or the closed EDI. The scale of e-commerce has increased as internet develops, however, turning to the online e-commerce, which caused a number of issues such as authentication, information forgery, and non-repudiation between the parties. To prevent conflicts from such troubles and perform the post management, security technologies are applied throughout the process of e-commerce, certificates intervening. Lately, meanwhile, FinTech has been creating a sensation around the mobile payment service. Incidents of information leakage from card corporations and hackings imply the need of securing safety of the financial service. Development and evolution of FinTech industry must be accompanied by information protection. Therefore, this research aims to inquire into the information security system of leading FinTech company in a foreign country.

Digital video watermarking using fingerprint data (동영상 스트리밍 인증을 위한 지문 기반 워터마킹)

  • Jung, Soo-Yeun;Lee, Dong-Eun;Lee, Seong-Won;Paik, Joon-Ki
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.43-50
    • /
    • 2007
  • In this paper we propose a method that identifies users at H.264 streaming using watermarking with fingerprints. The watermark can efficiently reduce the potential danger of forgery or alteration. Especially a biometric watermark has various advantages. Among entire biometric characteristics, the fingerprint is the most convenient and economical. In this paper we propose a novel fingerprint-based watermarking technique that can survive under very low bit-rate compression. The proposed algorithm consists of enhancement of a fingerprint image, the watermark generation using the extracted feature coordinates, watermark insertion using discrete wavelet transform, and authentication. The proposed algorithm can achieve robust watermark extraction against 0.264 compressed videos.

Simple Method for Improving the Frequency Sweep Linearity of FMCW Collision Warning Radar (차량 충돌방지용 FMCW 레이더의 주파수 Sweep 선형성 개선을 위한 간단한 기법)

  • Hyun, Eu-Gin;Oh, Woo-Jin;Lee, Jong-Hun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.10
    • /
    • pp.1109-1115
    • /
    • 2010
  • FMCW(Frequency Modulation Continuous Wave) Radar can detect the distance and the velocity of forward obstacles using linearly modulated FM signal. For better performance, the RF of radar should be operated with wideband frequency linearity on 300 MHz bandwidth at 77 GHz carrier frequency. In this paper, we propose a simple method for improving frequency linearity of FMCW radar implemented with VCO. The proposed method shows that the Voltage-Frequency relation of VCO could be measured by using the modified Tx waveform of FMCW radar. Then the measured nonlinearity could be compensated using LUT(Look-up Table) with easy. It is noted that the proposed can be adopted in existing system without extra circuit.

Carrier Frequency Offset Estimation Method for Single-Carrier MIMO Systems (단일 반송파 MIMO 시스템 기반의 PN 부호열을 이용한 반송파 주파수 오차 추정 기법)

  • Oh, Jong-Kyu;Kim, Joon-Tae
    • Journal of Broadcast Engineering
    • /
    • v.17 no.5
    • /
    • pp.864-875
    • /
    • 2012
  • In this paper, we propose a carrier frequency offset estimation method for single-carrier MIMO systems. In the proposed method, phase rotated PN (Pseudo-Noise) sequences are transmitted to prevent a cancelling out of partial PN sequences. After removing a modulation of received PN sequences by multiplying of complex conjugated PN Sequences which are locally generated in receiver, a CFO (Carrier Frequency Offset) is accurately estimated by employing L&R method which is a kind of ML (Maximum Likelihood) estimation algorithm and uses multiple auto-correlatos. In addition, the frequency offset estimation scheme by using channel state information is proposed for accurate CFO estimation in time-varying Rayleigh channel. By performing computer simulations, MSE (Mean Square Error) performance of proposed method is almost same as MSE performance of SISO systems in AWGN channel. Moreover, MSE Performance of proposed method with using channel information is higher than MSE performances of SISO system and conventional method in time-varying Rayleigh channel.

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

Design and Comparison of Digital Predistorters for High Power Amplifiers (비선형 고전력 증폭기의 디지털 전치 보상기 설계 및 비교)

  • Lim, Sun-Min;Eun, Chang-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4C
    • /
    • pp.403-413
    • /
    • 2009
  • We compare three predistortion methods to prevent signal distortion and spectral re-growth due to the high PAPR (peak-to-average ratio) of OFDM signal and the non-linearity of high-power amplifiers. The three predistortion methods are pth order inverse, indirect learning architecture and look up table. The pth order inverse and indirect learning architecture methods requires less memory and has a fast convergence because these methods use a polynomial model that has a small number of coefficients. Nevertheless the convergence is fast due to the small number of coefficients and the simple computation that excludes manipulation of complex numbers by separate compensation for the magnitude and phase. The look up table method is easy to implement due to simple computation but has the disadvantage that large memory is required. Computer simulation result reveals that indirect learning architecture shows the best performance though the gain is less than 1 dB at $BER\;=\;10^{-4}$ for 64-QAM. The three predistorters are adaptive to the amplifier aging and environmental changes, and can be selected to the requirements for implementation.

Design of XMP-Based Electronic Document Architecture for Electronic Circulation of Litigation Documents (소송문서의 전자적 유통을 위한 XMP 기반 전자문서 구조 설계)

  • Park, Min-Soo;Song, Choong-Geun;Lee, Nam-Young;Kim, Jong-Bae
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.95-105
    • /
    • 2011
  • It has become commonplace to use web-based business process systems in a variety of fields, and electronic litigation is not an exception. In electronic procedures where court records are at the core of the system, the electronic document architecture should be designed in a way that electronic documents are safely circulated and utilized on the web with a consideration of the authentication of records, particularity of cases and document security such as prevention of forgery or falsification. Based on a study of electronic formats suitable for court records, the Extensible Markup Language (XMP) for management of special case information and security requirements for circulation of electronic documents, this paper suggests an adequate architecture for electronic documents designed for electronic litigation involving constitutional matters and looks into cases where such architectures are applied. The studies in this paper will serve as a useful reference for those planning to realize web-based business process that enables exchanges of electronic documents.

Internal Network Partition Security Model Based Authentication using BlockChain Management Server in Cloud Environment (클라우드 환경에서 블록체인관리서버를 이용한 인증기반 내부망 분리 보안 모델)

  • Kim, Young Soo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.434-442
    • /
    • 2018
  • Recently, the threat to the security and damage of important data leaked by devices of intranet infected by malicious code through the Internet have been increasing. Therefore, the partitioned intranet model that blocks access to the server for business use by implementing authentication of devices connected to the intranet is required. For this, logical net partition with the VDI(Virtual Desktop Infrastructure) method is no information exchange between physical devices connected to the intranet and the virtual device so that it could prevent data leakage and improve security but it is vulnerable to the attack to expose internal data, which has access to the server for business connecting a nonregistered device into the intranet. In order to protect the server for business, we suggest a blockchain based network partition model applying blockchain technology to VDI. It contributes to decrease in threat to expose internal data by improving not only capability to verify forgery of devices, which is the vulnerability of the VDI based logical net partition, but also the integrity of the devices.

Study on the Elimination of Residual Voltage in Quarter Wave Short Stub Surge Arrestor (4분의 1 파장 단락 스터브 방식 서지 어레스터의 잔여 전압 제거에 관한 연구)

  • Kim, Yeon-Tae;Won, Tae-Yeong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.8
    • /
    • pp.33-44
    • /
    • 2000
  • The lightning with high voltage and current can enter the basestations for mobile communication through their antenna. The device which can protect the basestation against the lightning, is surge arrestor. In this paper, the concept, kind, operating mechanism, design and fabrication of surge arrestor were studied. Based on the studied data, variable surge arrestors were designed for the current mobile communication service like a cellular, GSM and PCS and the next generation mobile communication like a IMT-2000. Computer simulation for the prediction of their characteristics and inner structure optimization for the improvement of their electrical characteristics were carried with high frequency 3D structure simulator. Quarter wave short stub surge arrestors for IMT-2000 were fabricated with their final design and then the measurement of electrical characteristics and the lightning test were executed. As a results of measurement, we obtained below 1.05 of VSWR, -0.035 dB of insertion loss, -150 dBc of intermodulation and 7∼ll V of residual voltage.

  • PDF

An Image forgery protection for real-time vehicle black box using PingPong-256MAC (PingPong-256MAC을 이용한 차량용 블랙박스 실시간 영상 위변조 방지 기술)

  • Kim, HyunHo;Kim, Min-Kyu;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.241-244
    • /
    • 2018
  • Domestic vehicle registration is continuously increasing every year, traffic accidents are also increasing by an increase in the number of vehicles. In the event of a traffic accident, the perpetrator and the victim should be judged and handled appropriately. When judging the accident situation, the black box is what evidence can be except for witness who is at the accident scene. The black box becomes an essential role in order to prevent traffic accidents. However, there is no way to prove integrity by evidence corruption, fabrication and etc. For this reason, we propose a method to guarantee the integrity of image through hash value generated by using PingPong 256 encryption algorithm for integrity verification in this paper.

  • PDF